Personal mobile devices pose the greatest risk within business networks
Personal mobile devices are the biggest threat to a business network. Although employees work from home, or like the BYOD principle, both pose a great risk to IT and security teams.
That's what a new investigation by Duo Security shows. The company interviewed one hundred British IT professionals an... Read more
Lenovo unveils end-to-end security ThinkShield for all its devices
Lenovo today unveiled ThinkShield. This security solution must protect the company's devices throughout their entire lifecycle. Users are also protected online and identities and credentials are kept safe.
ThinkShield is a process that keeps Lenovo products as safe as possible from start to finish. ... Read more
EU wants tech companies to remove extremist content within one hour
The European Union has proposed that large Internet platforms should be fined if they fail to filter out extremist content within one hour. These services include Facebook, Google and Twitter. This is still a proposal, not a policy.
Last March, the European Union asked Internet companies to indicate... Read more
British Airways was hacked by Magecart, the group that also attacked Ticketmaster…
Researchers from British Airways have discovered that the group that recently performed a large hack is the same one that attacked Ticketmaster. The Magecard Group has been active since 2015, when it was first discovered by researchers from RisqIQ and ClearSky.
The group regularly attacks webshops a... Read more
Hackers increasingly abuse public cloud services for DDoS attacks
Hackers are increasingly abusing public cloud services to carry out DDoS attacks. More than a quarter of DDoS attacks take advantage of this. The most abused public cloud service is Microsoft Azure.
The public cloud is increasingly being used by hackers to carry out DDoS attacks. A quarter of the cr... Read more
WordPress phishing campaign steals with fake database upgrade login details
Researchers from Sucuri have come across a new phishing campaign that focuses on WordPress sites. This involves sending fake messages about database upgrades in order to eventually cause major problems for website owners and operators.
The attack campaign distinguishes itself from previous phishing ... Read more
Microsoft reveals how it deals with security issues in Windows
Microsoft has released two documents detailing how the company deals with security issues. The documents were prepared by the Microsoft Security Response Center (MSRC) within a year. This department receives and handles security-related reports on bugs.
The two documents consist of a website and a ... Read more
“The Netherlands is significantly more affected by malware than Belgium.
The Netherlands is more affected by malware than Belgium, according to G DATA on the basis of a half-yearly analysis. It's supposed to be 30 percent. On the other hand, approximately 35 percent more potentially unwanted programs (PUPs) have been observed in Belgium than in the Netherlands. These are... Read more
Thales and Gemalto get permission to acquire in the US
Thales and Gemalto have obtained approval from the Committee on Foreign Investment in the United States (CFIUS) to acquire Gemalto. The acquisition involves an amount of 4.8 billion euros. The two market leaders in security hardware will become one company after the acquisition.
Previously, the comp... Read more
Kaspersky comes up with cloud service Security Cloud
Kaspersky Lab announces the Kaspersky Security Cloud, a service for consumers that allows them to scale up security at any time. The Security as a Service solution is not linked to the equipment, but to the owner via an account on the My Kaspersky portal. The Security Cloud assumes that each user is... Read more